MISP / MISP-Taxii-Server
An OpenTAXII Configuration for MISP
☆80Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for MISP-Taxii-Server
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- A utility repo to assist with converting between MISP and STIX formats☆64Updated 3 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Definition, description and relationship types of MISP objects☆92Updated last week
- Carbon Black Feeds☆70Updated last year
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- TAXII client implementation from EclecticIQ☆98Updated 3 years ago
- Hunting IOCs all day every day...☆83Updated last year
- A Splunk app to use MISP in background☆109Updated 3 weeks ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 5 months ago
- Generate STIX XML from OpenIOC XML☆89Updated 6 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- ☆55Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Threat Feed Aggregation, Made Easy☆166Updated 4 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago
- IOC Management and Visualization Tool☆47Updated last year
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆36Updated last year
- A set of templates for documenting threat intelligence☆73Updated 11 years ago
- A website and framework for testing NIDS detection☆56Updated 3 years ago
- stoQ Public Plugins☆71Updated last year
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 8 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago
- Scripts for TheHive.☆22Updated 5 years ago
- Cyber Intel Management☆46Updated 6 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆68Updated 3 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago